CINXE.COM
VizSec
<!DOCTYPE html> <html> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width initial-scale=1" /> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <title>VizSec</title> <meta name="description" content="The IEEE Symposium on Visualization for Cyber Security (VizSec) is a forum that brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. "> <link rel="stylesheet" href="/assets/css/main.css"> <link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.8.2/css/solid.css" integrity="sha384-ioUrHig76ITq4aEJ67dHzTvqjsAP/7IzgwE7lgJcg2r7BRNGYSK0LwSmROzYtgzs" crossorigin="anonymous"> <link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.8.2/css/fontawesome.css" integrity="sha384-sri+NftO+0hcisDKgr287Y/1LVnInHJ1l+XC7+FOabmTTIK0HnE2ID+xxvJ21c5J" crossorigin="anonymous"> <link rel="canonical" href="https://vizsec.org/vizsec2018/"> <link rel="apple-touch-icon-precomposed" sizes="57x57" href="/assets/img/favicon/apple-touch-icon-57x57.png" /> <link rel="apple-touch-icon-precomposed" sizes="114x114" href="/assets/img/favicon/apple-touch-icon-114x114.png" /> <link rel="apple-touch-icon-precomposed" sizes="72x72" href="/assets/img/favicon/apple-touch-icon-72x72.png" /> <link rel="apple-touch-icon-precomposed" sizes="144x144" href="/assets/img/favicon/apple-touch-icon-144x144.png" /> <link rel="apple-touch-icon-precomposed" sizes="60x60" href="/assets/img/favicon/apple-touch-icon-60x60.png" /> <link rel="apple-touch-icon-precomposed" sizes="120x120" href="/assets/img/favicon/apple-touch-icon-120x120.png" /> <link rel="apple-touch-icon-precomposed" sizes="76x76" href="/assets/img/favicon/apple-touch-icon-76x76.png" /> <link rel="apple-touch-icon-precomposed" sizes="152x152" href="/assets/img/favicon/apple-touch-icon-152x152.png" /> <link rel="icon" type="image/png" href="/assets/img/favicon/favicon-196x196.png" sizes="196x196" /> <link rel="icon" type="image/png" href="/assets/img/favicon/favicon-96x96.png" sizes="96x96" /> <link rel="icon" type="image/png" href="/assets/img/favicon/favicon-32x32.png" sizes="32x32" /> <link rel="icon" type="image/png" href="/assets/img/favicon/favicon-16x16.png" sizes="16x16" /> <link rel="icon" type="image/png" href="/assets/img/favicon/favicon-128.png" sizes="128x128" /> <meta name="application-name" content=" "/> <meta name="msapplication-TileColor" content="#FFFFFF" /> <meta name="msapplication-TileImage" content="/assets/img/favicon/mstile-144x144.png" /> <meta name="msapplication-square70x70logo" content="/assets/img/favicon/mstile-70x70.png" /> <meta name="msapplication-square150x150logo" content="/assets/img/favicon/mstile-150x150.png" /> <meta name="msapplication-wide310x150logo" content="/assets/img/favicon/mstile-310x150.png" /> <meta name="msapplication-square310x310logo" content="/assets/img/favicon/mstile-310x310.png" /> <link rel="stylesheet" href="/assets/css/cfp_sidebar.css" media="screen" type="text/css"> </head> <body> <div class="navbar-underlay"></div> <nav class="navbar navbar-inverse navbar-fixed-top"> <div class="hidden-xs hidden-sm pull-right"><a href="http://www.ieee.org/"><img id="ieee" src="/assets/img/branding_ieee.png" alt="IEEE Logo"/></a></div> <div class="container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="/"><img src="/assets/img/branding_logo.png" alt="VizSec Logo"/></a> </div> <div id="navbar" class="navbar-collapse collapse"> <ul class="nav navbar-nav"> <li><a href="/vizsec2023"><i class="fas fa-file-alt" aria-hidden="true"></i> VizSec 2023 Home<i class="nav-sep fas fa-circle"></i></a></li> <li><a href="/sponsorship"><i class="fas fa-university" aria-hidden="true"></i> Sponsorship<i class="nav-sep fas fa-circle"></i></a></li> <li><a href="/news"><i class="fas fa-bullhorn" aria-hidden="true"></i> News<i class="nav-sep fas fa-circle"></i></a></li> <li><a href="/past"><i class="fas fa-calendar-alt" aria-hidden="true"></i> Past Years<i class="nav-sep fas fa-circle"></i></a></li> <li><a href="/data"><i class="fas fa-database" aria-hidden="true"></i> Data<i class="nav-sep fas fa-circle"></i></a></li> <li><a href="/about"><i class="fas fa-info-circle" aria-hidden="true"></i> About</a></li> </ul> </div><!--/.navbar-collapse --> </div> </nav> <div class="page-content-default"> <div class="container"> <div class="row"> <div class="col-md-8"> <h2><img alt="Magnifying glass" src="/assets/img/branding_magnifier.png" class="header-magnifier"/>VizSec 2018</h2> <h3>Welcome to 15th IEEE Symposium on Visualization for Cyber Security</h3> <p>VizSec 2018 will be held in <strong>Berlin, Germany</strong> in conjunction with <a href="http://ieeevis.org/">IEEE VIS</a> on <strong>Monday October 22nd</strong>. VizSec brings together researchers and practitioners in information visualization and security to address the specific needs of the cyber security community through new and insightful visualization techniques.</p> <!-- <p><em>Interested in attending?</em> Please <a href="http://ieeevis.org/year/2018/info/registration/conference-registration">register for IEEE VIS</a> (our host) and indicate you plan to attend VizSec 2018 when prompted. There are 1-day, 2-day, and full-week registration options. The conference hotel is the <a href="http://ieeevis.org/year/2018/info/registration/hotel-information">Hyatt Regency Phoenix</a>, and the conference itself will be held in the Phoenix Convention Center. Please see <a href="http://ieeevis.org/">ieeevis.org</a> for more details.</p> <p>The <a href="http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8052583">VizSec 2017 Proceedings</a> are available in the <a href="http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8052583">IEEE Digital Library</a>. Recordings of the presentations can be found on the <a href="https://vimeopro.com/vgtcommunity/vizsec2017">VizSec 2017 Vimeo group</a>.</p> //--> <p><em>Questions?</em> Please email <a href="mailto:chair@vizsec.org">chair@vizsec.org</a> for questions regarding VizSec 2018.</p> <!-- <div class="text-center" style="margin-top: 4ex;"> <a class="btn btn-info btn-lg" href="https://www.dropbox.com/s/wy5qr1mfe0y5sed/vizsec2017_proceedings.zip?dl=0" role="button"><i class="fas fa-download"></i> Download Proceedings<sup>*</sup></a><br/> <small class="text-muted"><em><sup>*</sup>Link only active during symposium. Password will be provided in opening remarks.</em></small> </div> //--> <a class="page-anchor" id="program"></a> <h3>Program</h3> <!-- <p>VizSec 2017 will be held all day on <strong>Monday October 2nd</strong> in room <strong>301-C</strong> on the 300 Level of the <a href="https://www.phoenixconventioncenter.com/floor-plans-specs">West Building</a> (between Second and Third Street on Monroe) in the <a href="https://www.phoenixconventioncenter.com/">Phoenix Convention Center</a>.</p> //--> <table class="program"> <tbody> <tr> <td>9:00</td> <td>–</td> <td>9:15am</td> <td> <h4> Opening Remarks <a href="https://goo.gl/nF1Cme" style="border: none;"><i class="fas fa-external-link"></i></a><br/> <small>Remarks by Diane Staheli</small> </h4> </td> </tr> <tr> <td>9:15</td> <td>–</td> <td>10:15am</td> <td> <h4> Keynote Address<br/> <small>Introduced by Diane Staheli</small> </h4> <p> <strong>Forever Failing - Why infosec is still not here</strong> by <strong>Dr. Sandro Gaycken</strong>, <em class="text-muted">Director of the Digital Society Institute ESMT, Berlin, Germany</em> </p> <p>Please see <a href="#keynote">below</a> for the full abstract and bio.</p> </td> </tr> <tr> <td>10:15</td> <td>–</td> <td>10:40am</td> <td> <h4> VizSec Poster and Demo Fast Forward<br/> <small>Moderated by Jörn Kohlhammer</small> </h4> <p>Please see <a href="#posters">below</a> for a list of accepted posters.</p> </td> </tr> <tr class="text-muted"> <td>10:40</td> <td>–</td> <td>11:00am</td> <td><em>Break</em> </td> <tr> <td>11:00</td> <td>–</td> <td>12:40pm</td> <td> <h4> Paper Session: Networks and Privacy<br/> <small>Moderated by Sophie Engle</small> </h4> <p>Visual-Interactive Identification of Anomalous IP-Block Behavior Using Geo-IP Data <em class="text-muted">by Alex Ulmer, Marija Schufrin, David Sessler, Jörn Kohlhammer</em> <a href="https://ieeexplore.ieee.org/document/8709182/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308133195" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> <p>Looking for a Black Cat in a Dark Room: Security Visualization for Cyber-Physical System Design and Analysis <em class="text-muted">by Georgios Bakirtzis, Brandon James Simon, Cody H Fleming, Carl R. Elks</em> <a href="https://ieeexplore.ieee.org/document/8709187/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308133381" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> <p>Visual Analytics for Root DNS Data <em class="text-muted">by Eric Krokos, Alexander R Rowden, Kirsten Whitley, Amitabh Varshney</em> <a href="https://ieeexplore.ieee.org/document/8709205/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308133476r" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> <p>An Empirical Study on Perceptually Masking Privacy in Graph Visualizations <em class="text-muted">by Jia-Kai Chou, Chris Bryan, Jing Li, Kwan-Liu Ma</em> <a href="https://ieeexplore.ieee.org/document/8709181/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308133652" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> </td> </tr> <tr class="text-muted"> <td>12:40</td> <td>–</td> <td>2:20pm</td> <td><em>Lunch Break</em> </td> <tr> <td>1:00</td> <td>–</td> <td>2:00pm</td> <td> <h4> Birds-of-a-Feather Lunchtime Discussion: “Transition: The Power of Adaptation and Accommodation”<br/> <small>Led by Awalin Sopan, FireEye, Inc.</small> </h4> <p> Technology around us is constantly evolving, so is our surroundings. While people from underrepresented group often go through more changes when they are reaching for success, change is something we all can related to. Being in a highly interdisciplinary field, we have much to share about how we can navigate the changes around us. We will see technological and demographic shift, and we ourselves will change over time. A large population vulnerable to cyber-threat are not in that position because their passwords were hacked, but because of their belief in the internet, may it be fake news or bot-accounts. How can we utilize our experience with transition to empathize with more people, and design a more successful career for ourselves and better products as well? <br/> </p> <tr> <td>2:20</td> <td>–</td> <td>3:35pm</td> <td> <h4> Paper Session: Analytics<br/> <small>Moderated by John Goodall</small> </h4> <p>Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC <em class="text-muted">by Awalin, Sopan, Matthew Berninger, Murali Kiran Mulakaluri, Raj Katakam</em> <a href="https://ieeexplore.ieee.org/document/8709231" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308133805" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a> <br/> </p> <p>Visualizing Automatically Detected Periodic Network Activity <em class="text-muted">by Robert Gove, Lauren Deason</em> <a href="https://ieeexplore.ieee.org/document/8709177/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308133999" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> <p>Crush your data with ViC^2ES then CHISSL away <em class="text-muted">by Dustin L Arendt, Lyndsey Franklin, Fumeng Yang, Brooke Brisbois, Ryan LaMothe</em> <a href="https://ieeexplore.ieee.org/document/8709212/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308134119" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> </td> </tr> <tr class="text-muted"> <td>3:35</td> <td>–</td> <td>4:00pm</td> <td><em>Demos</em> </td> <tr class="text-muted"> <td>4:00</td> <td>–</td> <td>4:20pm</td> <td><em>Break</em> </td> <tr> <td>4:20</td> <td>–</td> <td>5:10pm</td> <td> <h4> Paper Session: Malware Analysis<br/> <small>Moderated by Jörn Kohlhammer</small> </h4> <p> ROPMate: Visually Assisting the Creation of ROP-based Exploits <em class="text-muted">by Marco Angelini, Graziano Blasilli, Pietro Borrello Borrello, Emilio Coppa, Daniele Cono D'Elia, Serena Ferracci, Simone Lenti, Giuseppe Santucci</em> <span class="label label-info"><i class="fa fa-trophy"></i> Best Paper</span> <a href="https://ieeexplore.ieee.org/document/8709204/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308134382" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a> <br/> <small class="text-info"><em><i class="fas fa-trophy"></i> Best Paper Award Sponsored by <strong>Two Six Labs</strong>.</em></small> </p> <p>Eventpad: Rapid Malware Analysis and Reverse Engineering using Visual Analytics <em class="text-muted">by Bram Cappers, Paulus N. Meessen, Sandro Etalle, Jarke van Wijk</em> <a href="https://ieeexplore.ieee.org/document/8709230/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308134460" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></li></p> </td> </tr> <tr> <td>5:10</td> <td>–</td> <td>5:50pm</td> <td> <h4> Paper Session: Short Papers<br/> <small>Moderated by Robert Gove</small> </h4> <p>User Behavior Map: Visual Exploration for Cyber Security Session Dat <em class="text-muted">by Siming Chen, Shuai Chen, Natalia Andrienko, Gennady Andrienko, Phong H. Nguyen, Cagatay Turkay, Olivier Thonnard, Xiaoru Yuan</em> <a href="https://ieeexplore.ieee.org/document/8709223/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308134784" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> <p>TAPESTRY: Visualizing Interwoven Identities for Trust Provenance <em class="text-muted">by Yifan Yang, John Collomosse, Arthi Kanchana Manohar, Jo Briggs, Jamie Steane</em> <a href="https://ieeexplore.ieee.org/document/8709236/" style="border: none; text-indent: 0em;"><i class="fas fa-file-alt" aria-hidden="true"></i></a> <a href="https://vimeo.com/308134921" style="border: none; text-indent: 0em;"><i class="fas fa-file-video" aria-hidden="true"></i></a></p> </td> </tr> <tr> <td>5:50</td> <td> <h4> Closing Remarks<br/> <small>Diane Staheli</small> </h4> </td> </tr> </table> <a class="page-anchor" id="keynote"></a> <h3>Keynote</h3> <img class="pull-right img-thumbnail" src="/assets/img/sandrogayken.jpg" alt="Dr Sandro Gaycken" style="margin-left: 6px; margin-bottom: 2px;"> <h4 class="media-heading"> Dr Sandro Gaycken<br/> <small>Senior Researcher and Director of the Digital Society Institute<br/> ESMT Berlin </small> </h4> <!-- <h5>Maintaining Context</h5> <p>What is the most difficult challenge to using visualization tools to obtain and maintain cyber situational awareness? Is it the data? Analytics? Stale dashboards or displays? Users? My vote is context. Visualization tools often fail to obtain significant adoption or user acceptance because the context obtained at one level of sharing (strategy, operational, tactical, or technical) is lost when viewed by different people, teams, or at a different level. Developing visualization strategies and tools that enable users to integrate data and information while maintaining context through the various levels of sharing is critical to achieving useful situational awareness in cyber and can be a vital feature in advancing the art of cyber security.</p> //--> <h5>Biography</h5> <p>Dr Sandro Gaycken is founder and director of the Digital Society Institute at ESMT Berlin. He has published five scientific monographs, three on cyberwarfare, and more than 60 other scientific publications on cybersecurity. Sandro is an Oxford Martin School Fellow, a program committee member of Harvard-MIT’s annual conference series on cyber defense and cyber norms, a Senior Advisor for the AI Initiative at Harvard Kennedy School, co-lead “Programme Transverse Sécurité Défense, Sec. Cybersecurity” at elite French university CNAM, an EastWest Senior Fellow, a Senior Fellow of the German Council on Foreign Relations, a member of the Conversation Circle Intelligence Services in Germany, and an IEEE permanent reviewer. As an advisor to the German government, he developed the German foreign cyber policy strategy, testified numerous times in German parliament, and conducted many parliamentary dialogues. He was instrumental in bringing about the German chancellory’s German-Chinese No-Spy agreement, in the White House USTR’s effort to mitigate industrial espionage, and in IAEA and G8 efforts to control nuclear cybersecurity. In cyber military affairs, Sandro served as part of the German MoD’s cyber defense white book process, and moderated interdepartmental cyber coordination efforts. He serves as an expert witness in NATO military cyber counterintelligence cases, and as director in NATO’s SPS program, which develops and implements national cyberdefense strategies and technologies in the Middle East region. As an industrial advisor, Sandro has conducted nine major industry studies, ranging from smartgun and semiconductor component security assessments to strategic industry development issues. He advises large German cyber investors such as ammer!partners and Allianz ventures, developed Allianz’s cyber risk assessment methodology, and produced a buyer’s guide for the German DIHK and SME community, which lists 120 external criteria to assess the security quality of an IT-product. Sandro also founded the high assurance security company SECURE ELEMENTS Ltd., which offers impenetrable embedded systems and highly secure execution environments. Devoted to an open discourse and public enlightenment, he writes frequent op-eds in leading German newspapers like Handelsblatt, FAZ, Süddeutsche, and DIE ZEIT, and he comments regularly on cyber matters on mainstream media outlets such as Tagesschau, Heute, NTV, N24, CNN, BBC, Bloomberg, Forbes, The Economist, The Guardian, The Times, Wired, Vanity Fair, and Al Jazeera.</p> <a class="page-anchor" id="posters"></a> <h3>Posters</h3> <P> poster viewing will be in the Foyers room on Wednesday 5:20-7:00 PM during the main VIS power session</P> <ul> <li>Doing User Behaviour Analytics through Interactive Visual User Profiles <em>by Phong H. Nguyen, Siming Chen, Natalia Andrienko, Gennady Andrienko, Olivier Thonnard, Cagatay Turkay</em> <a href="/files/2018/Nguyen_Poster_Doing User Behaviour Analytics.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>Designing Visualisation Enhancements for SIEM Systems <em>by Phong H. Nguyen, Siming Chen, Natalia Andrienko, Michael Kamp, Linara Adilova, Gennady Andrienko, Olivier Thonnard, Alysson Bessani, Cagatay Turkay</em> <a href="/files/2018/Nguyen_Poster_Designing Visualisation Enhancements.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>Visual Content Privacy Leaks on Social Media Networks <em>by Jasmine DeHart, Christan Grant</em> <a href="/files/2018/DeHart_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/> </li> <li>Email Campaign Explorer for Detecting Malicious Email Campaigns <em>by Awalin Sopan, Parnian Najafi</em> <a href="/files/2018/Sopan_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>A Set Visualization Tool for Network Metadata Exploration and Threat Hunting <em>by Brett Fouss, Dennis Ross, Shannon Robinson, Kenneth Alperin</em> <a href="/files/2018/Fouss_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/> </li> <li>Exploring the role of experts’ knowledge in visualizations for cyber security <em>by Fabian Böehm, Noëlle Rakotondravony, Günther Pernul, Hans P. Reiser</em> <a href="/files/2018/Bohm_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>Towards Bridging the Gap Between Visual Cybersecurity Analytics and Non-Experts by Means of User Experience Design <em>by Marija Schufrin, Alex Ulmer, David Sessler, Jörn Kohlhammer</em> <a href="/files/2018/Schufrin_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>Multi-layer Onion-ring Visualization of Distributed Clusters for SmartX Multiview Visibility and Security <em>by Jun-Sik Shin, Muhammad Usman, JongWon Kim</em> <a href="/files/2018/Shin_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>An Exploration of User Centered and System Based Approaches to Cyber Situation Awareness <em>by Margaret Varga, Carsten Winkelhotz, Susan Träeber-Burdin</em> <a href="/files/2018/Varga_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> <li>Visualizing Remote Network Reactions with Firewall Probe <em>by Hyuga Kobayashi, Hideya Ochiai, Hiroshi Esaki</em> <a href="/files/2018/Kobayashi_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> </ul> <li>Heterogeneous Logs Graph Visualization and Clustering for Attack Traces Discovery <em>by Laetitia Leichtnam, Éric Totel, Nicolas Prigent, Ludovic Mé </em> <a href="/files/2018/Leichtnam_Poster.pdf" style="border: none; text-indent: 0em;"><i class="fa fa-download"></i></a><br/><br/></li> </ul> </ul> <a class="page-anchor" id="cfp"></a> <h3>Call for Papers</h3> <p> The 15th IEEE Symposium on Visualization for Cyber Security (VizSec) brings together researchers and practitioners from academia, government, and industry to address the needs of the cyber security community through new and insightful visualization and analysis techniques. VizSec provides an excellent venue for fostering greater exchange and new collaborations on a broad range of security- and privacy-related topics. VizSec will be held in <strong>Berlin, Germany</strong> in conjunction with <a href="http://ieeevis.org/">IEEE VIS</a>, on <strong>Monday, October 22nd, 2018.</strong> </p> <p> VizSec explores effective and scalable visual interfaces for security domains such as network security, computer forensics, reverse engineering, insider threat detection, cryptography, privacy, user assisted attacks prevention, compliance management, wireless security, secure coding, and penetration testing. </p> <p> VizSec solicits both full and short papers, both of which will be published in the proceedings that will be published by IEEE. Authors of accepted papers must guarantee that their papers will be presented at the conference. </p> <h4>Technical Papers</h4> <p> Full papers describing novel contributions in security visualization are solicited. Papers may present techniques, applications, theory, analysis, experiments, or evaluations. We encourage the submission of papers on technologies and methods that improve cyber security practices, including, but not limited to: </p> <ul> <li>Situation awareness and/or understanding</li> <li>Incident handling including triage, exploration, correlation, and response</li> <li>Computer forensics</li> <li>Recording and reporting results of investigations</li> <li>Assisting proactive security configuration and deployment</li> <li>Reverse engineering and malware analysis</li> <li>Vulnerability management</li> <li>Multiple data source analysis</li> <li>Analyzing information requirements for computer network defense</li> <li>Evaluation and/or user testing of VizSec systems</li> <li>Criteria for assessing the effectiveness of cyber security visualizations (whether from a security goal perspective or a human factors perspective) </li> <li>Modeling system and network behavior</li> <li>Modeling attacker and defender behavior</li> <li>Studying risk and impact of cyber attacks</li> <li>Predicting future attacks or targets</li> <li>Security metrics and education</li> <li>Software security</li> <li>Mobile application security</li> <li>Social networking privacy and security</li> </ul> <br/> <p> When applicable, visualization and interaction techniques that effectively capture the insights of human analysts and/or allow analysts to collaborate efficiently are particularly desirable. </p> <p> Submissions including tests and evaluations of existing tools and techniques are also considered particularly desirable. If possible, making the data used for the tests available will also be considered positively. If you do not have real-world data to demonstrate your visualization, you may be interested in looking at the <a href="/data/">VizSec Data Sets</a> page. </p> <h4>Short Papers</h4> <p> Short papers describing practical applications of security visualization are solicited. We encourage the submission of papers discussing the introduction of cyber security visualizations into operational context, including, but not limited to: </p> <ul> <li>Cases where visualization made positive contributions towards meeting operational needs</li> <li>Gaps or negative outcomes from visualization deployments</li> <li>Situations where visualization was not utilized, but could have had a positive impact</li> <li>Lessons learned from operational engagements</li> <li>Insights gained from the transition process</li> </ul> <p> <br/> Cyber security practitioners from industry, as well as the research community, are encouraged to submit case studies. </p> <h4>Posters</h4> <p> Poster submissions may showcase late-breaking results, work in progress, preliminary results, or visual representations relevant to the VizSec community. The poster program will be a great opportunity for the authors to interact with the attendees and solicit feedback. Accepted poster abstracts will be made available on the VizSec website. </p> <a class="page-anchor" id="awards"></a> <h3>Awards</h3> <p> There will be an award for the best paper from the accepted program. This award will be given to the paper judged to have the highest overall quality as determined by the program committee. Key elements of the selection process include whether papers include evaluation, repeatable results, and open-source data or software. Both full and short papers are eligible. </p> <p> Thanks to the generous support of <a href="https://www.twosixlabs.com/">Two Six Labs</a>, the best paper awardee will receive a $100 Amazon gift card! </p> <a class="page-anchor" id="submissions"></a> <h3>Submissions</h3> <p> The VizSec 2018 proceedings will be published by IEEE. Submissions must be formatted using the IEEE "Conference Style" template that can be found at: </p> <p> <a href="http://junctionpublishing.org/vgtc/Tasks/camera.html">http://junctionpublishing.org/vgtc/Tasks/camera.html</a> </p> </p> <p> All submissions must be in PDF format. </p> <p> <a href="https://new.precisionconference.com/submissions"> https://new.precisionconference.com/submissions</a> </p> <p> After logging in, click the submissions link on the top navigation bar. Select Society: VGTC, Conference: VizSec 2018 </p> <p class="text-muted small"> <span class="label label-default">Note</span> Posters will be submitted via email instead of PCS. For more information, please see the <strong>Posters</strong> section below. </p> <h4>Papers</h4> <p> Full Papers should be at most <strong>8 pages</strong> including the bibliography and appendices. Short papers should be at most <strong>4 pages</strong> including the bibliography and appendices. </p> <p> <em>All papers</em> will be peer-reviewed by at least 3 members of the program committee. Committee members are not required to read the appendices or any pages past the maximum. Submissions not meeting these guidelines will be rejected without consideration of their merit. </p> <p> Reviews are single-blind, so authors may include names and affiliations in their submissions. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. </p> <h4>Posters</h4> <p> To submit a poster, please email an extended abstract as a PDF attachment to <a href="mailto:posters@vizsec.org">posters@vizsec.org</a> and include the author names and affiliations in the email body. Extended abstract should be at most 2 pages including the bibliography. Poster abstracts will be reviewed by the Poster Chair(s) and other members of the organizing committee to determine relevance to the VizSec community. </p> <p> Accepted authors must present a corresponding poster during the workshop. The poster authors can determine the layout by themselves, but the dimensions of the posters should not exceed the A0 space (841mm x 1189mm or 33.1" x 46.8"). Additionally, poster authors are requested to give a brief oral preview during a plenary "fast forward" session. </p> <p> Accepted poster abstracts will be made available on this website. </p> <a class="page-anchor" id="scholarships"></a> <h3>Diversity Scholarships</h3> <p>Thanks to the generous donations of our sponsors, we are delighted to announce that we will be offering several <strong>VizSec 2018 Diversity Scholarship</strong> awards to help cover the costs of attending VizSec. This scholarship award covers full week registration plus a small stipend to help offset travel costs.</p> <h4> Application Process </h4> <p>All VizSec attendees may apply for the diversity scholarships except for those from a country on the OFAC sanctions list at:</p> <p><a href="http://www.ieee.org/conferences_events/conferences/organizers/sanctions.html">http://www.ieee.org/conferences_events/conferences/organizers/sanctions.html</a> </p> <p>Applicants must submit a cover letter and curriculum vitae in PDF format. The cover letter should discuss your eligibility for this scholarship and how you would benefit from attending VizSec 2017. It should be no more than 2 pages (letter size) with at least 1 inch margins and 11pt or larger font.</p> <p>Applications will also be asked to answer the following questions:</p> <ul> <li>Have you ever attended VizSec or VIS before? If so, when?</li> <li>Are you currently a student? If so, please specify the degree and subject area you are working on, and where. </li> <li>Are you from an underrepresented group in computer science? If so, please specify.</li> <li>Please let us know your country or countries of citizenship, and the country and city you will be traveling from. </li> </ul> <br/> <p>To apply for this scholarship, login or create an account at:</p> <p><a href="https://new.precisionconference.com/vizsec18b ">https://new.precisionconference.com/vizsec18b </a></p> <p>After logging in, click the "new submissions" link on the top navigation bar and look for the link for "Submit to VizSec 2018 Diversity Scholarship" in the list under the "VIS 2018" heading.</p> <p>The application deadline is August 22, 2018 at 5:00pm PDT. Awardees will be notified by September 04, 2018, and must register for the conference by the early registration deadline on September 7, 2018.</p> <a class="page-anchor" id="dates"></a> <h3>Important Dates</h3> All deadlines are 5:00 PM PST. <h4>Call for Papers</h4> <table class="vizsec-cfp-dates"> <tr> <td><strong>March 7, 2018</strong></td> <td>Call For Papers Open</td> </tr> </table> <h4>Papers and Short Papers</h4> <table class="vizsec-cfp-dates"> <tr> <td><strong>July 22, 2018</strong></td> <td>Submission for Papers and Short Papers <span class="label label-info">Extended</span></td> </tr> <tr> <td><strong>August 15, 2018</strong></td> <td>Author Notification for Papers and Short Papers <span class="label label-info">Updated</span></td> </tr> <tr> <td><strong>August 24, 2017</strong></td> <td>Camera Ready Submission and Copyright Forms for Papers <span class="label label-info">Updated</span></td> </tr> </table> <h4>Posters</h4> <table class="vizsec-cfp-dates"> <tr> <td><strong>August 29, 2018</strong></td> <td>Abstract Submission for Posters</td> </tr> <tr> <td><strong>September 9, 2018</strong></td> <td>Author Notification for Posters</td> </tr> </table> <h4>Scholarships</h4> <table class="vizsec-cfp-dates"> <tr> <td><strong>August 22, 2018</strong></td> <td>Application for Diversity Scholarships</td> </tr> <tr> <td><strong>September 4, 2018</strong></td> <td>Applicant Notification for Scholarships</td> </tr> <tr> <td><strong>September 7, 2018</strong></td> <td>VizSec/VIS Early Registration Deadline</td> </tr> </table> <h3>Committees</h3> <h4>Organizing Committee</h4> <ul> <li> <span class="committee name"> <a href="https://www.ll.mit.edu/mission/cybersec/cybersec-bios/staheli-bio.html">Diane Staheli</a>, </span> <span class="committee role">General Chair Chair</span><br> <span class="committee affiliation">MIT Lincoln Laboratory</span> </li> <li> <span class="committee name"> Celeste Lyn Paul, </span> <span class="committee role">Program Co-Chair</span><br> <span class="committee affiliation">US Department of Defense</span> </li> <li> <span class="committee name"> <a href="https://www.igd.fraunhofer.de/en/institute/about-us/contact-persons/jorn-kohlhammer">Jörn Kohlhammer</a>, </span> <span class="committee role">Program Co-Chair</span><br> <span class="committee affiliation">Fraunhofer IGD</span> </li> <li> <span class="committee name"> Stoney Trent, </span> <span class="committee role">Poster Chair</span><br> <span class="committee affiliation">United States Army</span> </li> <li> <span class="committee name"> <a href="http://www.pnnl.gov">Daniel Best</a>, </span> <span class="committee role">Publications Chair</span><br> <span class="committee affiliation">Pacific Northwest National Laboratory</span> </li> <li> <span class="committee name"> <a href="https://twitter.com/NeeKoP">Nicolas Prigent</a>, </span> <span class="committee role">Publicity Chair</span><br> <span class="committee affiliation">LSTI</span> </li> <li> <span class="committee name"> <a href="https://www.twosixlabs.com/">Robert Gove</a>, </span> <span class="committee role">Sponsorship Chair</span><br> <span class="committee affiliation">Two Six Labs</span> </li> <li> <span class="committee name"> Graig Sauer, </span> <span class="committee role">Web Chair</span><br> <span class="committee affiliation">US Department of Defense</span> </li> </ul> <h4>Program Committee</h4> <ul> <li> <span class="committee name"> Marco Angelini </span> <span class="committee affiliation">Sapienza University of Rome</span> </li> <li> <span class="committee name"> Dustin Arendt </span> <span class="committee affiliation">Pacific Northwest National Laboratory</span> </li> <li> <span class="committee name"> Daniel Best </span> <span class="committee affiliation">Pacific Northwest National Laboratory</span> </li> <li> <span class="committee name"> Lauren Bradel </span> <span class="committee affiliation">U.S. Department of Defense</span> </li> <li> <span class="committee name"> Andrea Brennen </span> <span class="committee affiliation">In-Q-Tel</span> </li> <li> <span class="committee name"> Laurin Buchanan </span> <span class="committee affiliation">Secure Decisions</span> </li> <li> <span class="committee name"> Bram Cappers </span> <span class="committee affiliation">University of Technology Eindhoven (Tu/e)</span> </li> <li> <span class="committee name"> Siming Chen </span> <span class="committee affiliation">Peking University</span> </li> <li> <span class="committee name"> Ann Cox </span> <span class="committee affiliation">U.S. Department of Homeland Security</span> </li> <li> <span class="committee name"> Sophie Engle </span> <span class="committee affiliation">University of San Francisco</span> </li> <li> <span class="committee name"> Fabian Fischer </span> <span class="committee affiliation">University of Konstanz</span> </li> <li> <span class="committee name"> Carrie Gates </span> <span class="committee affiliation">Securelytix</span> </li> <li> <span class="committee name"> John Gerth </span> <span class="committee affiliation">Stanford University</span> </li> <li> <span class="committee name"> Mohammad Ghoniem </span> <span class="committee affiliation">Luxembourg Institute of Science and Technology</span> </li> <li> <span class="committee name"> Robert Gove </span> <span class="committee affiliation">Two Six Labs</span> </li> <li> <span class="committee name"> Lane Harrison </span> <span class="committee affiliation">Worcester Polytechnic Institute</span> </li> <li> <span class="committee name"> Christopher Humphries </span> <span class="committee affiliation">INRIA</span> </li> <li> <span class="committee name"> Jörn Kohlhammer </span> <span class="committee affiliation">Fraunhofer IGD</span> </li> <li> <span class="committee name"> Philip Legg </span> <span class="committee affiliation">University of the West of England</span> </li> <li> <span class="committee name"> Timothy Leschke </span> <span class="committee affiliation">U.S. Department of Defense, Johns Hopkins University</span> </li> <li> <span class="committee name"> Kristen Liggett </span> <span class="committee affiliation">Air Force Research Laboratory</span> </li> <li> <span class="committee name"> Frédéric Majorczyk </span> <span class="committee affiliation">DGA</span> </li> <li> <span class="committee name"> Raffael Marty </span> <span class="committee affiliation">Loggly</span> </li> <li> <span class="committee name"> Sean McKenna </span> <span class="committee affiliation">University of Utah</span> </li> <li> <span class="committee name"> Chris Muelder </span> <span class="committee affiliation">Google</span> </li> <li> <span class="committee name"> Stephen North </span> <span class="committee affiliation">Infovisible, LLC</span> </li> <li> <span class="committee name"> Celeste Paul </span> <span class="committee affiliation">U.S. Department of Defense, University of Maryland</span> </li> <li> <span class="committee name"> Nicolas Prigent </span> <span class="committee affiliation">LSTI</span> </li> <li> <span class="committee name"> Noëlle Rakotondravony </span> <span class="committee affiliation">Universität Passau</span> </li> <li> <span class="committee name"> Rosa Romero-Gómez </span> <span class="committee affiliation">Uncharted Field Services Corporation</span> </li> <li> <span class="committee name"> Giuseppe Santucci </span> <span class="committee affiliation">University of Rome "La Sapienza"</span> </li> <li> <span class="committee name"> Graig Sauer </span> <span class="committee affiliation">U.S. Department of Defense, Towson University</span> </li> <li> <span class="committee name"> Christopher Simpson </span> <span class="committee affiliation">National University</span> </li> <li> <span class="committee name"> Awalin Sopan </span> <span class="committee affiliation">FireEye, Inc.</span> </li> <li> <span class="committee name"> Diane Staheli </span> <span class="committee affiliation">MIT Lincoln Laboratory</span> </li> <li> <span class="committee name"> Sebastien Tricaud </span> <span class="committee affiliation">Splunk</span> </li> <li> <span class="committee name"> David Trimm </span> <span class="committee affiliation">University of Maryland, Baltimore County (UMBC)</span> </li> <li> <span class="committee name"> Kirsten Whitley </span> <span class="committee affiliation">U.S. Department of Defense</span> </li> <li> <span class="committee name"> Joseph Yuen </span> <span class="committee affiliation">Defence Science Technology Organisation</span> </li> </ul> <a class="page-anchor" id="supporters"></a> <h3>Supporters</h3> <ul class="media-list"> <li class="media"> <div class="media-left"> <a href="https://www.twosixlabs.com/"> <img class="media-object center-block" src="/assets/img/supporter-twosixlabs-2017.png"> </a> </div> <div class="media-body"> <h5 class="media-heading">Two Six Labs</h5> <p>Two Six Labs invents, prototypes and engineers breakthrough technologies for government and industry, with broad commitments in multiple areas of technological innovation. Two Six Labs' projects range from situational awareness interfaces for cyber operators to distributed sensor networks, from machine learning models that learn to reverse engineer malware to embedded devices that enable and protect our nation's warfighters.</p> <p> Open Position(s): <a href="https://careers-twosixlabs.icims.com/jobs/1091/front-end-software-engineer/job">Front End Software Engineer</a> </p> </div> </li> <li class="media"> <div class="media-left"> <a href="https://punchcyber.com/"> <img class="media-object center-block" src="/assets/img/Punchv2.png"> </a> </div> <div class="media-body"> <h5 class="media-heading">PUNCH</h5> <p>PUNCH is a boutique cyber-consulting firm that provides advanced analytics and strategic support to government and commercial clients. Our primary focus is in improving an organization’s awareness of and ability to manage a growing cyber threat environment. We focus on bolstering cyber preparedness by improving an organization’s analysts and the tools at their disposal.</p> <p> Open Position(s): </p> </div> </li> <li class="media"> <div class="media-left"> <a href="https://www.igd.fraunhofer.de/en"> <img class="media-object center-block" src="/assets/img/IGDLogo.jpg"> </a> </div> <div class="media-body"> <h5 class="media-heading">Fraunhofer IGD</h5> <p>Fraunhofer IGD is one of the world’s leading institutes for applied research in Visual Computing, including computer graphics, computer vision, as well as virtual and augmented reality. We are part of Germany's largest research network on cyber-security for IT-based systems called CRISP, where IGD is responsible for user-centered visual analytics and biometric procedures.</p> <p> Open Position(s): </p> </div> </li> <li class="media"> <div class="media-left"> <a href="http://www.datamachines.io/"> <img class="media-object center-block" src="/assets/img/datamachines.png"> </a> </div> <div class="media-body"> <h5 class="media-heading">Data Machines Corp</h5> <p>Data Machines Corp. is a small company dedicated to researching and advancing the state of the art in data analytics, multi-user cloud data analytic architectures, and large scale data processing pipelines.</p> <p> Open Position(s): <a href="http://www.datamachines.io/job-openings">Data Machines Jobs</a> </p> </div> </li> <li class="media"> <div class="media-left"> <a href="https://www.fireeye.com/"> <img class="media-object center-block" src="/assets/img/fireeye.png"> </a> </div> <div class="media-body"> <h5 class="media-heading">FireEye</h5> <p>FireEye is the leader in intelligence-led security-as-a-service. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,000 customers across 67 countries, including more than 45 percent of the Forbes Global 2000.</p> <p> Open Position(s): </p> </div> </li> </ul> </div> <div class="col-md-4 sidebar"> <div> <a id="contact" class="page-anchor"></a> <h4><i class="fas fa-envelope" aria-hidden="true"></i> Get in Touch</h4> <p> Email <a href="mailto:chair@vizsec.org">chair@vizsec.org</a> for questions regarding the latest VizSec event. For general questions, email <a href="mailto:info@vizsec.org">info@vizsec.org</a> or post to our <a href="https://groups.google.com/forum/#!forum/vizsec">Google group.</a> </p> <p> <i class="fas fa-hashtag" aria-hidden="true"></i> Follow <a href="https://twitter.com/vizsec">@vizsec</a> on Twitter! </p> </div> <!--<div class="sidebar_dates hidden-sm hidden-xs">--> <!--<h4><i class="fas fa-calendar" aria-hidden="true"></i> Important Dates</h4>--> <!----> <!--<h5>Call for Papers</h5>--> <!--<table>--> <!----> <!--<tr>--> <!--<th>Mar 7</th>--> <!--<td>Call For Papers Open</td>--> <!--</tr>--> <!----> <!--</table>--> <!----> <!--<h5>Papers and Short Papers</h5>--> <!--<table>--> <!----> <!--<tr>--> <!--<th>Jul 22</th>--> <!--<td>Submission Deadline <span class="label label-info">Extended</span></td>--> <!--</tr>--> <!----> <!--<tr>--> <!--<th>Aug 15</th>--> <!--<td>Author Notification <span class="label label-info">Updated</span></td>--> <!--</tr>--> <!----> <!--<tr>--> <!--<th>Aug 24</th>--> <!--<td>Camera Ready Deadline <span class="label label-info">Updated</span></td>--> <!--</tr>--> <!----> <!--</table>--> <!----> <!--<h5>Posters</h5>--> <!--<table>--> <!----> <!--<tr>--> <!--<th>Aug 29</th>--> <!--<td>Abstract Deadline</td>--> <!--</tr>--> <!----> <!--<tr>--> <!--<th>Sep 9</th>--> <!--<td>Author Notification</td>--> <!--</tr>--> <!----> <!--</table>--> <!----> <!--<h5>Scholarships</h5>--> <!--<table>--> <!----> <!--<tr>--> <!--<th>Aug 22</th>--> <!--<td>Application Deadline</td>--> <!--</tr>--> <!----> <!--<tr>--> <!--<th>Sep 4</th>--> <!--<td>Scholarship Notification</td>--> <!--</tr>--> <!----> <!--<tr>--> <!--<th>Sep 7</th>--> <!--<td>Early Registration</td>--> <!--</tr>--> <!----> <!--</table>--> <!----> <!--</div>--> <!--<div class="sidebar_supporters hidden-sm hidden-xs">--> <!--<h4><i class="fas fa-star" aria-hidden="true"></i> Supporters</h4>--> <!----> <!--<p><a href="https://www.twosixlabs.com/"><img src="/assets/img/supporter-twosixlabs-2017.png" class="img-responsive"></a></p>--> <!----> <!--<p><a href="https://punchcyber.com/"><img src="/assets/img/Punchv2.png" class="img-responsive"></a></p>--> <!----> <!--<p><a href="https://www.igd.fraunhofer.de/en"><img src="/assets/img/IGDLogo.jpg" class="img-responsive"></a></p>--> <!----> <!--<p><a href="http://www.datamachines.io/"><img src="/assets/img/datamachines.png" class="img-responsive"></a></p>--> <!----> <!--<p><a href="https://www.fireeye.com/"><img src="/assets/img/fireeye.png" class="img-responsive"></a></p>--> <!----> <!--<br/>--> <!--</div>--> <div> <h4><i class="fas fa-bullhorn" aria-hidden="true"></i> VizSec News</h4> <ul> <li> <a href="/2023/04/05/CFP.html">VizSec 2023 Call for Papers and Deadlines</a> </li> <li> <a href="/2023/02/06/Online.html">VizSec 2023 Website</a> </li> <li> <a href="/2022/10/04/Program.html">VizSec 2022 Program</a> </li> <li> <a href="/2022/04/21/CFP.html">VizSec 2022 Call for Papers and Deadlines</a> </li> <li> <a href="/2022/03/16/Online.html">VizSec 2022 Website</a> </li> <li> <a href="/2021/10/06/Program.html">VizSec 2021 Program</a> </li> <li> <a href="/2021/04/15/CFP.html">VizSec 2021 Call for Papers</a> </li> <li> <a href="/2021/03/15/Online.html">VizSec 2021 Website</a> </li> <li> <a href="/2020/09/29/DnIScholarship.html">Inclusivity and Diversity scholarship</a> </li> <li> <a href="/2020/09/28/Registration.html">VizSec 2020 Registration</a> </li> <li> <a href="/2020/05/18/CFP.html">VizSec 2020 Call for Papers</a> </li> <li> <a href="/2019/09/17/Program-and-Posters-Posted.html">VizSec 2019: Program Schedule and Posters Announced</a> </li> <li> <a href="/2019/06/13/deadline-extension.html">Submission Deadline Extended to June 19th, 2019</a> </li> <li> <a href="/2019/04/28/keynote.html">Chris Oehmen to Keynote at VizSec 2019</a> </li> <li> <a href="/2019/02/28/CFP.html">VizSec 2019 Call for Papers</a> </li> <li> <a href="/2019/01/19/videos-posted.html">VizSec 2018 Videos and Proceeding Available</a> </li> <li> <a href="/2017/12/05/Videos-Posted.html">VizSec 2017 Videos Posted</a> </li> <li> <a href="/2017/09/19/Program-Posted.html">VizSec 2017 Program Posted</a> </li> <li> <a href="/2017/07/18/Deadline-Extended.html">VizSec 2017 Deadline Extended</a> </li> <li> <a href="/2017/07/11/Best-Paper-Award.html">VizSec 2017 Best Paper Award</a> </li> <li> <a href="/2017/03/07/CFP.html">VizSec 2017 Call for Papers</a> </li> <li> <a href="/2016/11/28/Papers-in-IEEE.html">VizSec 2016 papers are in the IEEE DL</a> </li> <li> <a href="/2016/09/27/Program-Schedule-Available.html">Program Schedule Available</a> </li> <li> <a href="/2016/09/20/Jay-Jacobs-Keynote.html">Jay Jacob's to Provide Keynote</a> </li> <li> <a href="/2016/09/08/Registration.html">VizSec 2016 Registration</a> </li> <li> <a href="/2016/04/11/CFP.html">VizSec 2016 Call for Papers</a> </li> <li> <a href="/2015/11/11/Papers-in-IEEE.html">VizSec 2015 papers are in the IEEE DL</a> </li> <li> <a href="/2015/10/22/Papers-for-VizSec-2015.html">Papers for VizSec 2015</a> </li> <li> <a href="/2015/10/12/VizSec-2015-Schedule.html">VizSec 2015 Program Schedule</a> </li> <li> <a href="/2015/06/15/CFP.html">VizSec 2015 Call for Papers</a> </li> </ul> </div> <div class="sidebar_extraneous"> <h4><i class="fas fa-calendar-alt" aria-hidden="true"></i> Past VizSec Events</h4> <div> <dl class="dl-horizontal-xs vizsec-event-sidebar-list"> <dt><a href="/vizsec2022/"><span class="label label-primary">2022</span></a></dt> <dd><small>Hybrid Conference, Oklahoma City, USA</small></dd> <dt><a href="/vizsec2021/"><span class="label label-primary">2021</span></a></dt> <dd><small>Virtual Conference</small></dd> <dt><a href="/vizsec2020/"><span class="label label-primary">2020</span></a></dt> <dd><small>Virtual Conference</small></dd> <dt><a href="/vizsec2019/"><span class="label label-primary">2019</span></a></dt> <dd><small>Vancouver, Canada</small></dd> <dt><a href="/vizsec2018/"><span class="label label-primary">2018</span></a></dt> <dd><small>Berlin, Germany</small></dd> <dt><a href="/vizsec2017/"><span class="label label-primary">2017</span></a></dt> <dd><small>Phoenix, AZ, USA</small></dd> <dt><a href="/vizsec2016/"><span class="label label-primary">2016</span></a></dt> <dd><small>Baltimore, MD, USA</small></dd> <dt><a href="/vizsec2015/"><span class="label label-primary">2015</span></a></dt> <dd><small>Chicago, Illinois, USA</small></dd> <dt><a href="/vizsec2014/"><span class="label label-primary">2014</span></a></dt> <dd><small>Paris, France</small></dd> <dt><a href="/vizsec2013/"><span class="label label-primary">2013</span></a></dt> <dd><small>Atlanta GA, USA</small></dd> <dt><a href="/vizsec2012/"><span class="label label-primary">2012</span></a></dt> <dd><small>Seattle, WA, USA</small></dd> <dt><a href="/vizsec2011/"><span class="label label-primary">2011</span></a></dt> <dd><small>Pittsburgh, PA, USA</small></dd> <dt><a href="/vizsec2010/"><span class="label label-primary">2010</span></a></dt> <dd><small>Ottawa, ON, Canada</small></dd> <dt><a href="/vizsec2009/"><span class="label label-primary">2009</span></a></dt> <dd><small>Atlantic City, NJ, USA</small></dd> <dt><a href="/vizsec2008/"><span class="label label-primary">2008</span></a></dt> <dd><small>Cambridge, MA, USA</small></dd> <dt><a href="/vizsec2007/"><span class="label label-primary">2007</span></a></dt> <dd><small>Sacramento, CA</small></dd> <dt><a href="/vizsec2006/"><span class="label label-primary">2006</span></a></dt> <dd><small>Washington, DC, USA</small></dd> <dt><a href="http://www.cs.ucdavis.edu/~ma/VizSEC05/"><span class="label label-primary">2005</span></a></dt> <dd><small>Minneapolis, MN, USA</small></dd> <dt><a href="http://www.cs.fit.edu/~pkc/vizdmsec04/"><span class="label label-primary">2004</span></a></dt> <dd><small>Washington, DC, USA</small></dd> </dl> </div> <a id="viewallevents" class="btn btn-default btn-sm " href="/past">View all »</a> </div> </div> </div> </div> </div> <div class="footer"> <div> © The VizSec team; content licensed under <a href="https://creativecommons.org/licenses/by/3.0/">CC BY 3.0</a> </div> </div> <script src="/assets/js/jquery.min.js"></script> <script src="/assets/js/bootstrap.min.js"></script> <!-- <script src="/assets/js/jquery.tinycarousel.min.js"></script> --> <!-- <script type="text/javascript"> $(document).ready(function() { $('#slider1').tinycarousel(); }); </script> --> <script>var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-33862670-1']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();</script> </body> </html>